Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2011 Issue 6
xin xi dong tai
..............page:2-6,38,63
Network Coding in Secure Storage System based on Sparse Matrix
WANG Hao;LI Xiang-xue;ZHENG Dong
..............page:80-82
Acquisition of Keys Information by Access to PS/2 Keyboard Chip
GAO Zhi-xin;YING Li
..............page:61-63
Principles and Application of Data Management Center
ZHOU Zhe
..............page:51-53
E-Warranty\'s Secure Application in Insurance Trade
YANG Yong-guang
..............page:30
Bitstream-oriented Frequent Pattern Sequence Mining Algorithm
JIN Ling;QIU Wei-dong;YANG Xiao-niu;YANG Hong-wa
..............page:95-97,101
A VOIP Authentication Protocol based on IBE and Its Application in Government Intranet
ZHOU Bai-yun;DENG Zi-jian;DONG Gui-shan
..............page:102-104
Study on Spectrum Sensing Algorithm Capable of Differentiating Each Stage
SUN Jing-chao;CAO Hui
..............page:48-50
Study on Defense against Ferry Trojan Horse based on Data Diode Technology
WANG Wen-yu;LIU Yu-hong
..............page:83-85
A Discussion on Convergence of Web and IMS Services
WANG Hong;XU Bo;LI Jian;HAO Ping;LIAO Dan
..............page:69-71,74
A Novel Message Signature Scheme for Sparse Mobile Ad Hoc Network
LONG Ke;YU Neng-hai;LIU Bin
..............page:108-110
Access and Access Control based on PKI in MANET
ZHANG Chun-qin
..............page:72-74
Analysis and Defense of Botnets
CHEN Zhou-guo
..............page:56-60
Dynamical Rebuilding Import Address Table based on Hook Technique
LI Jia-jie;FANG Yong;LIU Liang
..............page:66-68
Jump\'s Security Solution of Intrusion Defense
SUN Xuan-an
..............page:28-29
Security Audit Mechanisms for Web Database
HAN Kun;XUE Hui
..............page:92-94
Security Mechanism for Internet Securities Trading System
CHEN Jing;MA Li
..............page:39-42
Research on Security Situation Reasoning Based on Prolog
CHEN Shi-lin
..............page:89-91,94
Data Security Application based on Beidou Satellite Navigation System
CHENG Xiang;CHEN Gong-liang;LI Jian-hua;GONG Jie-zhong
..............page:43-45
Fast and Reliable Transmission Method on High-speed Wireless Link
HU Wei;LI Da-shuang
..............page:46-47,50
Cooperative Key Extraction based on Channel Characteristics
WANG Li-kang;WU Yue
..............page:98-101
Design and Application of AHB Bus in Cryptographic SoC
WANG Rui-jiao;ZHANG Lu-guo;ZHANG Wen-zheng
..............page:75-77
Design of Text Retrieval and Information System
YU Shui-ying;WANG Hui;JIA Xiang
..............page:64-65,68
Research and Practice on Information Security System in Confidential Internal Network
SUN Zhi;QI Xue-gong;JIN Yi;ZHANG Ming
..............page:36-38